Spanning the Gap: Products for Public Access Wi-Fi Networks
|
|
- Lindsay O’Brien’
- 5 years ago
- Views:
Transcription
1 Public Access Wi-Fi Bulletin May 2003 Spanning the Gap: Products for Public Access Wi-Fi Networks Q: Are Home and Enterprise networking hardware products appropriate to Public Access Wi-Fi networks? Until just the last few years Wireless Fidelity (Wi-Fi) only appealed to the technologically savvy at home, or was one hundred percent implemented and supported by a full time IT staff at work. One promise technology has made for the wireless computing world is ubiquitous Wi-Fi in both private and public spaces, whether for work or leisure. At long last we are starting to see wireless computing really available at your local coffee shack (maybe it s Starbucks ), in your hotel, or in your apartment building. We will see much more! The Wireless at Home and Enterprise Wireless markets defined the networking products available today. So the question that service providers, who are going to build the Wi-Fi network in your coffee shack and at your hotel, must answer is the one above: Are Home and Enterprise networking hardware products appropriate to Public Access Wi-Fi networks? A: No. We need a new class of Wi-Fi access hardware. The existing wireless solutions that were tailored to fit the Home and Enterprise markets leave unacceptable gaps when tasked with subscriber access in public spaces. These devices are too complex in some areas, too simple in others, and just not quite right in yet others. Home and Enterprise Wi-Fi products just do not fit the public, in a literal sense. The Public Access Opportunity Subscribers do not have to be sold on the benefits of wireless at this point. The more the better will be their motto. Wireless in the coffee shop, in the airport, at the hotel, at the trade show: they want it all. IDC (July 2002) estimates that by 2006, five million subscribers at forty-two thousand locations will regularly access the Internet over public Wi-Fi. Increased demand is driven by the growing number of off-site and mobile workers, currently estimated at seventy-eight million by Cahners In-Stat/MDR and expected to grow to one hundred and six million by The infrastructure rollout required to support these subscribers will be massive. A relatively new and exciting technology like public Wi-Fi, with pent-up and growing demand, can get by with less than optimal deployments using whatever hardware is available. However, as consumers get more savvy, service providers begin to butt heads, and investors want more, or any, return on their investments, the spoils of public access will go to the most efficient, best designed network systems. Will these new public access networks just be extensions of the well known Home and Enterprise networks? Or something new? Wireless network architects can make three design determinations, we would hope based on their analysis of user s needs.
2 Are Public Users Like Small Office/Home Office (SOHO) Users? This design presumes that the first concern of public access systems is cost. SOHO hardware is ultracheap and designed to be easy to deploy. Though generic and inflexible, these gateways have hit a fiftydollar price point, or even less in bulk. You get what you pay for, of course. Are Public Users Like Enterprise Users? This design presumes that the primary concerns of public access Wi-Fi users are security and performance. Enterprise hardware is the best of the best wireless technology has to offer. High performance, high gain (signal strength, range, and quality), high security. Cost is one big disadvantage, with enterprise gateways and access points in the four hundred to eight hundred dollar range. The biggest question for enterprise hardware is whether the features you are paying for in an enterprise box are valuable to public access users, and are there other features that enterprise users did not even want that are public access must haves. Do Public Users Have Unique Requirements? This design makes network architects nervous. Few people like dealing with new scenarios that defy convenient pigeon holing. The presumption here is that public access Wi-Fi users have different requirements than existing customers in the home and office. Rather than trying to match the existing hardware to these users, the system is designed from the ground up to address the exact public access requirements. The disadvantage here is that there may be few, or no, manufacturers with the just right gateway for public access. How to Deploy a Public Wi-Fi Network Before the network architect can decide what kind of hardware to deploy, an assessment of the system s requirements must be made. In addition to those features the end user/subscriber wants and will pay for, consideration must be made of the software applications used for billing and configuration by the Wireless Internet Service Provider (WISP), as well as the requirements of IT professionals who must manage the system. The hardware itself might be a wireless LAN access point connected to a hard wired WAN gateway, or a combination wireless WAN and LAN gateway. A Simple Public Wi-Fi Use Case: An example of how we think a user will approach and use the service will inform a discussion of requirements. Joe and Jane are business travelers with laptops configured with static IP addresses, configuration, and http proxies. Joe is a direct T-Mobile subscriber, while Jane uses Boingo through their partner network. When traveling they need and web browsing and they may even want to print locally. All this needs to work quickly and easily, without adding or changing any settings on their laptops. Public Wi-Fi hardware requirements: 1. Network connectivity so users can access the Internet, browse, , etc. As the no-brainer, the hardware must have basic network support along with all that entails. Any gateway, home, enterprise or other would be expected to have these technologies, among others: b or g, IP Routing (TCP/UDP, ARP, ICMP), NAT and NATP, DHCP, DNS, PPP 2. Configurability The plethora of possible venues where these devices may be found means that the gateway itself must be manageable and configurable in many different ways. A basic HTML management interface will satisfy a small venue, while more sophisticated networks require a telnet-based Command Line Interface (CLI) or the Simple Network Management Protocol (SNMP). In addition, a sophisticated provider may have an
3 XML-based Operations Support System (OSS) used to automatically configure and monitor the network, requiring the gateway to support a web services model based on the Simple Object Access Protocol (SOAP). 3. Security Privacy and protection against theft of service are the top concerns for users and providers respectively. Joe and Jane do not want anyone reading their private s. T-Mobile, Boingo, and the Coffee Shack do not want hackers using the network for free, especially if they are not even drinking any cappuccino. Security has to work for everybody involved. a x to address well-known WEP weaknesses Unfortunately, a minimally skilled hacker can get free software to crack a WEP system and get full access within days or hours, depending on the volume of activity. A large public network, like an airport, would be extremely vulnerable. Longer or shorter encryption keys do not help this weakness. The new 802.1x enhancement to WEP protects the encryption keys using RADIUS to change them frequently. Supporting 802.1x require RADIUS support as well. b. Secure Web browsing using HTTPS Hyper Text Transport Protocol: Secure (HTTPS) using Secure Socket Layer (SSL) or Transport Layer Security (TLS) is the Internet standard for browser privacy via encryption. One possible complication is that the hardware itself must have its own HTTPS system. Configuration by an operator using the device s HTML GUI and users logging onto the system using their private name and password must be protected as well. Some gateways may only pass-through HTTPS from user machines the Internet, and may not have their own encrypted HTTP Server. This leaves unacceptable security vulnerability in the gateway. c. VPN pass through Virtual Private Networks (VPNs) are a way to create a private connection between machines that provides greatly improved security. Most likely Joe and Jane will log onto a VPN provided by their company, and set up by their IT staff, if they want to access company machines from outside the corporate network. It is important that a gateway support this kind of VPN. An additional VPN feature is the ability to terminate, rather than pass through, a VPN connection, meaning that the VPN connection starts or stops at the gateway itself. This is a key feature of an enterprise access point, but in general public users will want to connect to their existing company VPN, not create a new one at the airport. d. Firewall A firewall is a standard piece to software that would be in any but the lowest end gateway. It is very important to protect the network from malicious packets, worms, denial of service, and the like. e. Blacklist to ban abusive subscribers The gateway must allow the operator to identify bad actors on the network and prevent them from logging on again. Just canceling their account is not sufficient, since malicious users may just log on again under another name. A blacklist can associate these users with the MAC Address of their network card, preventing them from just logging on again with a new account. 4. RADIUS Billing Support Authentication, Access and Accounting (AAA) for Wireless ISP subscribers is generally accomplished using the well-defined Remote Authentication Dial In User Service (RADIUS) standard. This standard was originally designed for user access to modem banks, but has proven up to the task for wireless access control today. The WISP uses RADIUS to insure users are legitimate, track their usage patterns, bill value-added services, and any number of other account management chores. In addition, 802.1x depends
4 on RADIUS to protect the encryption keys. This makes RADIUS support extremely important for wireless access hardware. a. Local RADIUS One limitation of RADIUS is that it generally requires a separate RADIUS Server that is dedicated to tracking subscribers. Mostly often this server resides at a central location, such as the WISP headquarters. The problem is twofold. First, small venues may not have a central authority, leaving them to try to deal with installing an esoteric RADIUS server. Second, a network dependent on RADIUS for 802.1x security becomes vulnerable, or totally unusable, if the connection to the RADIUS authority is lost. For these two reasons a local RADIUS server, either on the gateway itself or as a separate device, is necessary. b. Local Credit Card Authentication A typical business model for public Wi-Fi is for users to log onto the network and then provide a credit card for daily or hourly access. Since AAA services are not coming from a central RADIUS server in a local configuration, the gateway must provide credit card authentication as well. 5. Multiple WISP Support A wireless network is beholden to a single WISP unless the gateway is capable of supporting several groups of subscribers simultaneously. Jane and Joe need to log onto different service home pages with different RADIUS Servers and different terms of service to get access to their T-Mobile and Boingo connections. The network hardware should be capable of supporting different user groups based on their preferred provider and subsequently distinguish between them. One way to create different user groups is by using multiple SSIDs at the access point. 6. WISP Branding Given that multiple WISPs are accessible on a particular public network, those providers will insist on being able to present their interfaces in accordance with their corporate image, with customized login pages, web content, etc. The access hardware must keep track of these ISP-provided brandings based on user selection of ISP. In addition, each WISP has separate Walled Gardens (pre-approved web pages not requiring log on) that their subscribers, actual or prospective, can access. 7. Physical Deployment The sheer variety of possible public venues means the hardware must be available with and without secure enclosures (so you can not steal it off the wall in the airport lounge), and with different antenna options offering different signal strength and direction. Some venues may even need weatherproof outdoor enclosures. 8. Transparency Transparency is a catch all for the user experience of everything just working. Because Jane and Joe, or any typical user, cannot be required to reconfigure their laptop, the network must support their laptops as they are. This extends to not installing proprietary clients, printer drivers, or any other software. a. Printing Typically wireless printing is just an extension of regular printing over the LAN. However, the user needs the appropriate printer driver installed. Since there is no guarantee that a user in the hotel will have a particular driver, the network must support a more generic method of printing to a local printer in the hotel lobby, airport information kiosk, or attached directly to the gateway itself. This could be accomplished using a file upload to a web page on the gateway, or via an attachment.
5 b. IP Settings User laptops may have any combination of static and dynamic IP settings, HTTP proxies, or other network settings. Realistically, these can not be changed each the time the user wants to connect, so the network must be configured to support any possible setting silently and transparently. c. As with IP settings above, public users may have any combination of Simple Mail Transport Protocol (SMTP) settings. In particular, subscribers may be using a SMTP server to send their where SMTP does not accept from outside a private network. Without intervention the subscriber s SMTP server will not send these s. The network must insure that this is correctly delivered by using its own SMTP server. d. WISP As in 5 and 5a above, the user must be able to select their specific WISP, assuming it is supported by the network, with branding, login methodology, and all of the other features that the subscriber is accustomed to from their WISP. A typical public access Wi-Fi application looks like the diagram below. Please note that the gateway is often authenticating to more than one Network Operating Center, so that different service providers may be supported at the location. In addition, 802.1x/RADIUS server functionality may be in the gateway itself for local authentication. The bottom line is that the gateway needs to be flexible enough to support different usage and billing scenarios. With an understanding of the public access user, hardware, and software requirements we can consider how the APs and gateways available off-the-shelf for Home and Enterprise today measure up. Home (SOHO) Wi-Fi: Too Cold At fifty dollars, or less, the price is right for SOHO gateways and access points. But how do they measure up to our requirements for a successful public network? Looking at the requirements above, not very well. The only area where SOHO hardware measures up is basic connectivity and a firewall. Configurability is in most cases limited to a Web GUI only, security consists of the vulnerable WEP, and RADIUS is absent in any form. No RADIUS means no WISP support at all, and a SOHO gateway is not going to handle any kind of non-standard user settings of any kind.
6 Conclusion Even at such a low price point, a Home Gateway is just not feature rich enough to be usable in a public network that has any kind of billing or security requirements. The money saved in deployment would just be squandered as users and operators became frustrated with the configuration problems and lack of features. This kind of gateway might be appropriate for a totally free hotspot in a café where it was free and open to all. Enterprise Wi-Fi: Too Hot At four hundred to eight hundred dollars, or more, the Enterprise gateway is a fine piece of hardware. Basic connectivity is there of course, and probably includes a, with its greater access speed, as well. Configurability via Web and SNMP are definite, with CLI probably, and SOAP maybe. Security is excellent, and probably includes VPN termination, and possibly a proprietary WLAN client with improved security (Cisco LEAP for example). RADIUS support is there, but probably not local RADIUS except at the top end. Firewall and deployment options are definitely there. However, there are some important features missing as well that may make the Enterprise gateway seem a little tepid. Multi-WISP support and WISP branding are not needed nor included in an Enterprise gateway. The transparency requirements are just not Enterprise issues, because the IT department can control the user s laptop settings. So , printing, and IP configuration are just going to be unavoidable headaches for users. The user can resolve and IP configuration problems by reconfiguring their laptop, which will work for technology savvy subscribers, but printing just will not work. Conclusion It must be recognized that the public Wi-Fi networks and hotspots that we enjoy today are for the most part based on deployment of Enterprise gateways, so there must have something going for them. The question, then, is Enterprise hardware the right answer? Creating a public network using enterprise gateways and access points is a waste of excellent technology and money. The extra features like VPN termination and a are simply not appropriate. Even worse, only the highest-end devices are likely to have local RADIUS, multiple WISP support, and SOAP, making this a painfully hot solution indeed. Billing and branding are the keys to successful public access Wi-Fi deployment. These issues are completely irrelevant to the Enterprise. Public Access Wi-Fi: Just Right A public access Wi-Fi gateway specially designed to satisfy our public access requirements will, of course, be right on target. On target to the extent that we have understood our customers. The danger was that no one would step forward to address these requirements, leaving no option for service providers wishing to establish a serious and profitable business for public access Wi-Fi. Fortunately, a select group of new companies, including ValuePoint Networks, are already moving ahead in this market space. These companies are providing products that fall into a spectrum of prices that match the requirements for a Public Access Wi-Fi deployment. Conclusion Superior branding and billing services are to key to the success of anyone deploying a network for public access Wi-Fi. Security and new feature technologies will become commodities once the excitement fades. Subscriber loyalty will be based on ease of use, as it always is. Given the plethora of Wi-Fi hardware available for Home and Enterprise, when architecting your public access Wi-Fi network choose hardware purpose built to contribute to your ultimate success. Design your network for all of the parties involved. Choose products designed from the ground up for billing, branding, and transparency in a public Wi-Fi network.
Network Controller. Complete Control and Management of Public Access Networks
Network Controller NC-3500 Complete Control and Management of Public Access Networks ValuePoint Networks 3500 Network Controller provides high performance, authenticated, and seamless broadband connectivity
More informationCopyright 2011 Nomadix, Inc. All Rights Reserved Agoura Road Suite 102 Agoura Hills CA USA White Paper
Nomadix Service Engine Access in Large Public Venues Copyright 2011 Nomadix, Inc. All Rights Reserved. 30851 Agoura Road Suite 102 Agoura Hills CA 91301 USA www.nomadix.com 230-1026-001 Sheet 2 of 9 Introduction
More informationBW1330. High Performance Hotspot Access Point
BW1330 High Performance Hotspot Access Point 9 July 2008 Overview Hardware Introduction Product Specification Product Features Application Overview Overview The BW1330 Hotspot Access Point is a high-performance
More informationCopyright 2011 Nomadix, Inc. All Rights Reserved Agnoura Road Suite 102 Agoura Hills, CA USA White Paper
Nomadix Service Engine Integration into Public Access Devices Copyright 2011 Nomadix, Inc. All Rights Reserved. 30851 Agnoura Road Suite 102 Agoura Hills, CA 91301 USA www.nomadix.com 230-1024-001 Sheet
More informationBW1330. High Performance Hotspot Access Point. Browan Communications. 6 August 2007 Version 1.0
BW1330 High Performance Hotspot Access Point Browan Communications 6 August 2007 Version 1.0 Overview Hardware Introduction Product Specification Product Features Application Customer Type Page 2 Overview
More informationTopGlobal MB8000 Hotspots Solution
MB8000 s MB8000 is a mobile/portable wireless communication gateway. It combines the best of Wi-Fi technology and 2.5G/3G mobile communication technology. WISP can deploy their wireless hotspots with MB8000
More informationG-4200 SMB PAC with built-in AAA
G-4200 SMB PAC with built-in AAA 10 Mar. 2008 Browan, Inc. Version 1.1 Page 1 Production overview The G-4200 is a cost-effective platform designed for small to medium sized public access venues. AT-A-GLANCE:
More informationCOPYRIGHTED MATERIAL. Index
Index Symbols and Numbers $ (dollar sign), in folder share names, 117 802.11a standard definition, 22 speed, 26 802.11b standard 802.11g standard 802.11i standard, 23 A access points compatibility, 45
More informationSecuring Wireless Networks by By Joe Klemencic Mon. Apr
http://www.cymru.com/ Securing Wireless Networks by By Joe Klemencic (faz@home.com) Mon. Apr 30 2001 Many companies make attempts to embrace new technologies, but unfortunately, many of these new technologies
More informationWayward Wi-Fi. How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk
Wayward Wi-Fi How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk 288 MILLION There are more than 288 million unique Wi-Fi networks worldwide. Source: Wireless Geographic Logging
More informationMain area: Security Additional areas: Digital Access, Information Literacy, Privacy and Reputation
Public Wi Fi Created: March 2016 Last Updated: July 2018 Estimated time: Group or individual activity: Ages: 60 minutes [10 minutes] Activity #1 [15 minutes] Activity #2 [10 minutes] Activity #3 [10 minutes]
More informationChildren s Health System. Remote User Policy
Children s Health System Remote User Policy July 28, 2008 Reason for this Policy This policy defines standards for connecting to the Children s Health System (CHS) network from any remote host. These standards
More informationHow to Stay Safe on Public Wi-Fi Networks
How to Stay Safe on Public Wi-Fi Networks Starbucks is now offering free Wi-Fi to all customers at every location. Whether you re clicking connect on Starbucks Wi-Fi or some other unsecured, public Wi-Fi
More informationSeamless Yet Secure -Hotspot Roaming
Seamless Yet Secure -Hotspot Roaming CDG Wi-Fi Summit 2003 Steve Reyes Product Management and Development 4501 Intelco Loop SE Olympia, WA 98507 913-814-6262 Sreyes@verisign.com 1 Vision: Mobile and Portable
More informationD-Link AirPlus G DWL-G700AP
TM D-Link AirPlus G DWL-G700AP 2.4GHz Wireless Access Point Manual Building Networks for People Contents Package Contents...3 Introduction...4 Wireless Basics...6 Getting Started...8 Using the Configuration
More informationDATA SHEET HIGHTLIGHTS Deploying a Single System to Manage All Devices and Services Implementing Service Assurance
Motorola EDGE Service Assurance Software Suite The allows service providers to expand broadband service revenues while reducing operational and support costs through automated service provisioning and
More informationExpected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy
CHAPTER 9 DEVELOPING NETWORK SECURITY STRATEGIES Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy Network Security Design
More informationAutomating VPN Management
Automating VPN Management By Scott Hilton, Vice President Product Management Assured Digital, Inc. Although many network managers, users and executives agree on the benefits of virtual private networking,
More informationWHG713. Secure WLAN Controller
WHG713 Secure WLAN Controller Copyright Notice This document is protected by USA copyright laws and other laws. Besides, the document is the property of 4IPNET, INC. You may not copy, reproduce, distribute,
More informationNetwork Controller 3500 Quick Start Guide
Network Controller 3500 Quick Start Guide Firmware Version 1.00.82 1. Configuring the Controller 1.1. Connect to the Controller: The default LAN IP Address of the Controller is: IP: 192.168.1.1 Set you
More informationWhite Paper Copyright 2002 Nomadix, Inc. All Rights Reserved. Tuesday, January 21, 2003
Wireless ISP Roaming Copyright 2002 Nomadix, Inc. All Rights Reserved. Tuesday, January 21, 2003 31355 Agoura Road Westlake Village, CA 91361 www.nomadix.com 230-1029-001 Page 2 of 24 Contents Introduction...
More informationWHG711 V3.20. Secure WLAN Controller
WHG711 V3.20 Secure WLAN Controller Copyright Notice This document is protected by USA copyright laws and other laws and is the property of 4IPNET, INC. You may not copy, reproduce, distribute, publish,
More informationSecuring Wireless LANs with Certificate Services
1 Securing Wireless LANs with Certificate Services PHILIP HUYNH University of Colorado at Colorado Springs Abstract Wireless Local Access Network (WLAN) is used popularly in almost everywhere from the
More informationEWS5207. Secure WLAN Controller
EWS5207 Secure WLAN Controller Copyright Notice This document is protected by USA copyright laws and other laws and is the property of Edgecore Networks Corporation. You may not copy, reproduce, distribute,
More informationIEEE 802.1x, RADIUS AND DYNAMIC VLAN ASSIGNMENT
IEEE 802.1x, RADIUS AND DYNAMIC VLAN ASSIGNMENT Hüseyin ÇOTUK Information Technologies hcotuk@etu.edu.tr Ahmet ÖMERCİOĞLU Information Technologies omercioglu@etu.edu.tr Nurettin ERGİNÖZ Master Student
More informationFIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 10 Authenticating Users
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 10 Authenticating Users Learning Objectives Explain why authentication is a critical aspect of network security Explain
More informationThe All-in-one Guest Access Solution of
The All-in-one Guest Access Solution of Redefining Networking Integration Tomorrow, Delivered Today Application Guide Series Series Application Guide Providing access in hospitality venues is not the same
More informationD-Link AirPlus G DI-524
D-Link AirPlus G DI-524 802.11g/ 2.4 GHz Wireless Router TM Manual Building Networks for People Contents Package Contents... 3 Introduction... 4 Wireless Basics... 8 Getting Started...11 Using the Configuration
More informationWhat is Eavedropping?
WLAN Security What is Eavedropping? War Driving War Driving refers to someone driving around with a laptop and an 802.11 client card looking for an 802.11 system to exploit. War Walking Someone walks
More informationTropos Technology Overview
Tropos Technology Overview May 2005 Enzo Zerbi Business Development Manager enzo.zerbi@programatica.it Agenda Introduction Tropos MetroMesh Architecture Tropos MetroMesh OS Predictive Wireless Routing
More informationAssignment Project Whitepaper ITEC495-V1WW. Instructor: Wayne Smith. Jim Patterson
Project Whitepaper ITEC495-V1WW Instructor: Wayne Smith Jim Patterson Table of Contents 1. Abstract Page 3 2. Introduction Page 3 3. Analysis Page 4 4. Solution Discussion Page 7 5. Evaluation Criteria
More informationChapter 11: Networks
Chapter 11: Networks Devices in a Small Network Small Network A small network can comprise a few users, one router, one switch. A Typical Small Network Topology looks like this: Device Selection Factors
More informationMulti-Layered Security Framework for Metro-Scale Wi-Fi Networks
Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks A Security Whitepaper January, 2004 Photo courtesy of NASA Image exchange. Image use in no way implies endorsement by NASA of any of the
More informationBuilding a Secure Wireless Network. Use i and WPA to Protect the Channel and Authenticate Users. May, 2007
Agenda: Securing Wireless Networks Building a Secure Wireless Network Joel M Snyder Senior Partner Opus One jms@opus1.com Using encryption and authentication Handling unauthenticated users Managing RF
More informationVirtual private networks
Technical papers Virtual private networks Virtual private networks Virtual private networks (VPNs) offer low-cost, secure, dynamic access to private networks. Such access would otherwise only be possible
More informationHigh Power Wi-Fi with Integrated Directional Antenna
SuperAP 530g IA-12 Rugged AP/Bridge High Power Wi-Fi with Integrated Directional Antenna ValuePoint Networks SuperAP 530g IA-12 is designed for indoor/outdoor Wi- Fi deployments in hotels, apartment buildings,
More informationSECURITY ON PUBLIC WI-FI New Zealand. A guide to help you stay safe online while using public Wi-Fi
SECURITY ON PUBLIC WI-FI New Zealand A guide to help you stay safe online while using public Wi-Fi WHAT S YOUR WI-FI PASSWORD? Enter password for the COFFEE_TIME Wi-Fi network An all too common question
More informationAP-51XX v r Release Notes Part Number 72E
AP-51XX v2.3.0.0-019r Release Notes Part Number 72E-126383-01 Introduction New Features AP-51XX Hardware/ Software Compatibility Matrix AP-51XX Default Configurations Firmware Update Resetting the AP-51XX
More information2018 Mobile Security Report
2018 Mobile Security Report CONTENTS Introduction 3 Businesses suspect their mobile workers are being hacked 4 Cafés, airports and hotels: a hotspot for Wi-Fi related security incidents 5 BYOD: Bring Your
More informationWHG711 Wireless LAN Controller
WHG711 Wireless LAN Controller Wireless INTRODUCTION The WHG711 is an enterprise-grade wireless LAN controller that provides establishments such as hotels, universities, or even complete municipalities
More informationThis course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N
CompTIA Network+ (Exam N10-007) Course Description: CompTIA Network+ is the first certification IT professionals specializing in network administration and support should earn. Network+ is aimed at IT
More informationThe following chart provides the breakdown of exam as to the weight of each section of the exam.
Introduction The CWSP-205 exam, covering the 2015 objectives, will certify that the successful candidate understands the security weaknesses inherent in WLANs, the solutions available to address those
More informationHotspots. May 15 th, 2008
Public Wireless Networks & Hotspots May 15 th, 2008 Overview Who are we? Solving the problem Network Design Approach Hotspot System Design Marketing / Deployment Who are we? Who we are. Wireless neutral-host
More informationCyber Security Guidelines for Public Wi-Fi Networks
Cyber Security Guidelines for Public Wi-Fi Networks Version: 1.0 Author: Cyber Security Policy and Standards Document Classification: PUBLIC Published Date: April 2018 Document History: Version Description
More informationA+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials
A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e Chapter 10 Networking Essentials Objectives Learn about hardware devices used for networking Learn about the different types of networks
More informationLevelOne. Quick Installation Guide. WHG series Secure WLAN Controller. Introduction. Getting Started. Hardware Installation
Introduction LevelOne WHG series Secure WLAN Controller LevelOne Secure WLAN Controller is the most advanced yet simple deployment and cost-effective wireless solution; it is an ideal security solution
More informationAccessing CharityMaster data from another location
Accessing CharityMaster data from another location When all of your computers are on the same Local Area Network (LAN), you can place the back end files (including your data and the Word templates) onto
More informationChapter 11: It s a Network. Introduction to Networking
Chapter 11: It s a Network Introduction to Networking Small Network Topologies Typical Small Network Topology IT Essentials v5.0 2 Device Selection for a Small Network Factors to be considered when selecting
More informationWireless Attacks and Countermeasures
Wireless Attacks and Countermeasures Wireless Network Technology Wireless network refers to any type of computer network which is wireless, and is commonly associated with a network whose interconnections
More informationUser Manual DIR-850L. Wireless AC1200 Dual Band Gigabit Router.
User Manual DIR-850L Wireless AC1200 Dual Band Gigabit Router USER MANUAL: DIR-850L Wireless AC1200 Dual Band Gigabit Router SYSTEM REQUIREMENTS Network Requirements Web-based Configuration Utility Requirements
More informationWNRT-627. Data Sheet. Europe/ ETSI: 2.412~2.472GHz (13 Channels) Japan/ TELEC: 2.412~2.484GHz (14 Channels) RF Power.
300Mbps 802.11n Wireless Broadband Router Ultra High Speed 802.11n Wireless The WNRT-627 features latest IEEE 802.11n radio with 2T2R MIMO antenna technology to provide improved wireless speed and coverage
More information5 Tips to Fortify your Wireless Network
Article ID: 5035 5 Tips to Fortify your Wireless Network Objective Although Wi-Fi networks are convenient for you and your employees, there may be unwanted clients using up the bandwidth you pay for. In
More informationFLEXIBLE WI-FI AUTHENTICATION
FLEXIBLE WI-FI AUTHENTICATION FEATURE GUIDE SUMMARY OF FEATURES BROWSER-BASED AUTHENTICATION 802.1X AUTHENTICATION EAP METHODS SUPPORTED IP/MAC-BASED AUTHENTICATION MULTIPLE ACTIVE AUTHENTICATION SERVERS
More informationExam Questions SY0-401
Exam Questions SY0-401 CompTIA Security+ Certification https://www.2passeasy.com/dumps/sy0-401/ 1. A company has implemented PPTP as a VPN solution. Which of the following ports would need to be opened
More informationSystem Structure. Steven M. Bellovin December 14,
System Structure Steven M. Bellovin December 14, 2015 1 Designing a System We have lots of tools Tools are rarely interesting by themselves Let s design a system... Steven M. Bellovin December 14, 2015
More informationOutline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.
Outline 18-759: Wireless Networks Lecture 10: 802.11 Management Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2016 http://www.cs.cmu.edu/~prs/wirelesss16/
More informationEnsuring the Success of E-Business Sites. January 2000
Ensuring the Success of E-Business Sites January 2000 Executive Summary Critical to your success in the e-business market is a high-capacity, high-availability and secure web site. And to ensure long-term
More informationDesigning AirPort Extreme n Networks
Designing AirPort Extreme 802.11n Networks 1 Contents Chapter 1 3 Getting Started 5 Configuring the AirPort Extreme Base Station for Internet Access Using AirPort Utility 6 Extending the Range of Your
More informationPMS 138 C Moto Black spine width spine width 100% 100%
Series MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective owners. 2009 Motorola, Inc. Table of
More informationXceedium Xio Framework: Securing Remote Out-of-band Access
Xceedium Xio Framework: Securing Remote Out-of-band Access 1 Common Scenario A major corporation, with many domestic and international offices, has a massive network infrastructure that spans across many
More informationSecuring Access to Network Devices
Securing Access to Network s Data Track Technology October, 2003 A corporate information security strategy will not be effective unless IT administrative services are protected through processes that safeguard
More informationWireless Network Security Fundamentals and Technologies
Wireless Network Security Fundamentals and Technologies Rakesh V S 1, Ganesh D R 2, Rajesh Kumar S 3, Puspanathan G 4 1,2,3,4 Department of Computer Science and Engineering, Cambridge Institute of Technology
More informationWireless Network Infrastructure. Inscape Data Corporation January 10, 2006
Wireless Network Infrastructure Inscape Data Corporation January 10, 2006 1 Introduction Purpose Providing fixed wireless Internet connectivity to the general population from rural towns to densely populated
More informationAccess Connections 5.1 for Windows Vista: User Guide
Access Connections 5.1 for Windows Vista: User Guide Access Connections 5.1 for Windows Vista: User Guide Note Before using this information and the product it supports, read the general information in
More informationCisco How Virtual Private Networks Work
Table of Contents How Virtual Private Networks Work...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 Background Information...1 What Makes a VPN?...2 Analogy:
More informationInovatian Mesh Technology. InoMesh Specifications & System Performance Sheet
Inovatian Mesh Technology InoMesh Specifications & System Performance Sheet Inovatian had developed in house a unique mesh technology: The InoMesh which is a substantial improvement over OpenWRT mesh with
More informationThe Benefits of Wireless Infrastructure Management in the Cloud
WHITE PAPER The Benefits of Wireless Infrastructure Management in the Cloud High Performance Wireless Networks The Benefits of Wireless Infrastructure Management in the Cloud How the cloud maximizes IT
More informationDeployment of Cisco IP Mobility Solution on Enterprise Class Teleworker Network
Deployment Guide Deployment of Cisco IP Mobility Solution on Enterprise Class Teleworker Network The Cisco Service Oriented Network Architecture (SONA) framework helps enterprise customers evolve their
More informationAgile Controller-Campus V100R002C10. Permission Control Technical White Paper. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD.
V100R002C10 Permission Control Technical White Paper Issue 01 Date 2016-04-15 HUAWEI TECHNOLOGIES CO., LTD. 2016. All rights reserved. No part of this document may be reproduced or transmitted in any form
More informationKarthik Pinnamaneni COEN 150 Wireless Network Security Dr. Joan Holliday 5/21/03
Karthik Pinnamaneni COEN 150 Wireless Network Security Dr. Joan Holliday 5/21/03 Introduction Although a variety of wireless network technologies have or will soon reach the general business market, wireless
More informationPASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year
PASS4TEST IT Certification Guaranteed, The Easy Way! \ http://www.pass4test.com We offer free update service for one year Exam : GSLC Title : GIAC Security Leadership Certification (GSLC) Vendors : GIAC
More informationA Division of Cisco Systems, Inc. GHz g. Wireless-G. User Guide. Access Point WIRELESS. WAP54G v2. Model No.
A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G Access Point User Guide Model No. WAP54G v2 Copyright and Trademarks Specifications are subject to change without notice. Linksys is
More informationPOLAR INTERNET SHARING, A CONNECTION OF CONSTELLATIONS
POLAR INTERNET SHARING, A CONNECTION OF CONSTELLATIONS WHAT IS POLARCOIN? (POL) Polarcoin is an open source peer to peer decentralized cryptocurrency. There is no server for this network cause computer
More information2. Layer-2 Ethernet-based VPN
2.1. Full Ethernet Virtualization The key concept of the method of realizing VPN by SoftEther VPN is the full virtualization of Ethernet segments, layer-2 Ethernet switches and Ethernet adapters. In order
More informationMTA_98-366_Vindicator930
MTA_98-366_Vindicator930 Number: 98-366 Passing Score: 700 Time Limit: 45 min File Version: 1.0 http://www.gratisexam.com/ Microsoft Technology Associate Networking Fundamentals MTA 98-366 Exam A QUESTION
More informationSecure VPNs for Enterprise Networks
Secure Virtual Private Networks for Enterprise February 1999 Secure VPNs for Enterprise Networks This document provides an overview of Virtual Private Network (VPN) concepts using the. Benefits of using
More informationDesigning AirPort Networks
Designing AirPort Networks 1 Contents Chapter 1 5 Getting Started 6 How AirPort Works 6 How Wireless Internet Access Is Provided 7 Configuring AirPort Extreme Base Station and AirPort Express for Internet
More informationPacket: Data can be broken into distinct pieces or packets and then reassembled after delivery. Computers on the Internet communicate via packets.
Broadband Setup from A to Z Print out all the info below and get to work...have fun!! A word of caution! It is very important that you SECURE your wireless network using WEP or WPA encryption (password).
More informationCONFIGURATION MANUAL. English version
CONFIGURATION MANUAL English version Frama F-Link Configuration Manual (EN) All rights reserved. Frama Group. The right to make changes in this Installation Guide is reserved. Frama Ltd also reserves the
More informationPurpose of this book. Chapter 1: Where to Begin
1 Where to Begin This book was created by a team of individuals who each, in their own field, are actively participating in the ever-expanding Internet by pushing its reach farther than ever before. The
More informationSECURING YOUR BUSINESS INFRASTRUCTURE Today s Security Challenges & What You Can Do About Them
BROTHER SECURITY WHITE PAPER NOVEMBER 2017 SECURING YOUR BUSINESS INFRASTRUCTURE Today s Security Challenges & What You Can Do About Them The last decade has seen many exciting advances in connectivity
More informationComputer to Network Connection
Computer to Network Connection Network Installation Steps Having a clear understanding of all the steps required to physically building a network improves the success of a project. You may need to install
More informationWireless LAN Controller Web Authentication Configuration Example
Wireless LAN Controller Web Authentication Configuration Example Document ID: 69340 Contents Introduction Prerequisites Requirements Components Used Conventions Web Authentication Web Authentication Process
More informationUser Guide Outdoor Point to Point CPE
Outdoor Outdoor Point to Point CPE Copyright Statement 2018 IP-COM Networks Co., Ltd. All rights reserved. is the registered trademark of IP-COM Networks Co., Ltd. Other brand and product names mentioned
More informationA Leading Internet Business Enabler
A Leading Internet Business Enabler How do I manage the network resources effectively and maximize my returns? My guests are bringing too many devices into my network. How do I manage them? I allow my
More informationWireless LAN Device Series. ZW-2000-IA User Manual
Wireless LAN Device Series WLAN Outdoor Bridge ZW-2000-IA User Manual Version. TABLE OF CONTENTS PREFACE...3 CH 1. ZW-2000 INSTALLATION...4 PACKING LIST...4 HARDWARE INSTALLATION...5 CH 2. FIRST TIME CONFIGURATION...8
More informationExam : Title : Security Solutions for Systems Engineers. Version : Demo
Exam : 642-566 Title : Security Solutions for Systems Engineers Version : Demo 1. Which one of the following elements is essential to perform events analysis and correlation? A. implementation of a centralized
More informationWHITE PAPER. A Manager s Guide To Wireless Hotspots How To Take Advantage Of Them While Protecting The Security Of Your Corporate Network
WHITE PAPER A Manager s Guide To Wireless Hotspots How To Take Advantage Of Them While Protecting The Security Of Your Corporate Network This paper discusses the security risks inherent in public Wi-Fi
More informationFAQ on Cisco Aironet Wireless Security
FAQ on Cisco Aironet Wireless Security Document ID: 68583 Contents Introduction General FAQ Troubleshooting and Design FAQ Related Information Introduction This document provides information on the most
More informationA+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials
A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e Chapter 10 Networking Essentials Objectives Learn about hardware devices used for networking Learn about the different types of networks
More informationNetworking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 1. Slide 2. Slide 3
Slide 1 Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 2 Unit
More informationTraining UNIFIED SECURITY. Signature based packet analysis
Training UNIFIED SECURITY Signature based packet analysis At the core of its scanning technology, Kerio Control integrates a packet analyzer based on Snort. Snort is an open source IDS/IPS system that
More informationTCP / IP. Isidro Martinez Director, Latin Amèrica
TCP / IP Isidro Martinez Director, Latin Amèrica Summary TCP/IP introduction IP addressing LAN, PSTN Services: Ping TCP, UDP DNS FTP, HTTP, Telnet SMTP, POP3 TCP/IP protocol suite Defines a set of protocols
More informationCYBER ATTACKS EXPLAINED: WIRELESS ATTACKS
CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS Wireless networks are everywhere, from the home to corporate data centres. They make our lives easier by avoiding bulky cables and related problems. But with these
More informationFive Reasons It s Time For Secure Single Sign-On
Five Reasons It s Time For Secure Single Sign-On From improved security to increased customer engagement, secure single sign-on is a smart choice. Executive Overview While cloud-based applications provide
More informationDesigning a System. We have lots of tools Tools are rarely interesting by themselves Let s design a system... Steven M. Bellovin April 10,
Designing a System We have lots of tools Tools are rarely interesting by themselves Let s design a system... Steven M. Bellovin April 10, 2007 1 Some of Our Tools Encryption Authentication mechanisms Access
More informationChapter 1 Introduction
Copyright Statement is the registered trademark of Zonet Technology Inc. All the products and product names mentioned herein are the trademarks or registered trademarks of their respective holders. Copyright
More informationFirewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003
Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003 A system or combination of systems that enforces a boundary between two or more networks - NCSA
More informationHow to configure the IAC4500 Internet Access Controller for Billing by Volume Application with NCT480 IP DSLAM using port location mapping
How to configure the IAC4500 Internet Access Controller for Billing by Volume Application with NCT480 IP DSLAM using port location mapping Introduction The following paper provides instructions on how
More informationCisco Exam Questions and Answers (PDF) Cisco Exam Questions BrainDumps
Cisco 300-375 Dumps with Valid 300-375 Exam Questions PDF [2018] The Cisco 300-375 Securing Cisco Wireless Enterprise Networks (WISECURE) exam is an ultimate source for professionals to retain their credentials
More information